Blog

  • Supply Chain Attacks

    Executive Summary

    Software and hardware supply-chain attacks surged in 2024–2026, enabling adversaries to spread malware or steal data by compromising trusted components and vendors. High-profile incidents include backdoored open-source libraries (e.g. XZ Utils in Mar 2024), compromise of SaaS platforms (Sisense in Apr 2024), mass npm repository infections (e.g. the “Shai-Hulud” worm in Sep 2025), and targeted attacks on Python packages (TeamPCP’s PyPI compromises in Mar 2026). Threat actors range from state-sponsored groups aiming at espionage or disruption to cybercriminals focused on fraud and extortion. The fallout has included widespread data exfiltration, service outages for downstream customers (as seen in Sweden’s Miljödata ransomware hit in Aug 2025[1]), and massive recovery costs (often millions of dollars[2]). We recommend a multi-layered defense: strict access controls (MFA, least privilege), secure build pipelines (signed code/artifacts, immutable SBOMs[3][4]), continuous monitoring for anomalies, robust vendor risk management, and well-practiced incident-response playbooks that include legal and communication steps. The report below documents a timeline of recent supply chain breaches, profiles of adversaries, impacts of attacks, and a prioritized checklist of mitigations.

    DateVictim(s) / ComponentAttack Vector / Technical DetailsAttributionImpact / FalloutRemediation
    Mar 29, 2024[5]XZ Utils (open-source data-compression library used in most Linux distros)Maintainer-signed malicious update inserted code to bypass SSH authentication (CVE-2024-3094)[5].Unknown (long-term compromise suggests nation-state)[6]Backdoor RCE across thousands of Linux systems; risk of full system compromise[5].Downgrade to safe version (e.g. xz-5.4.6) and hunt for intrusions[7]; apply patches/rollbacks.
    Apr 11, 2024[8]Sisense (BI SaaS platform)Undisclosed breach of Sisense internal systems (likely stolen credentials or internal compromise)[8].UnknownPotential exposure of customer analytics credentials; attacker “door” into many tenant networks[9].Customers instructed to reset all Sisense credentials immediately; monitor for suspicious activity[8]; apply tightened IAM controls and MFA on admin accounts.
    Apr 2024[10]3CX (communications software)*Compromised 3CX supply chain through a hijacked update (employee downloaded malicious software)[10].State-sponsored (North Korea)Infected 3CX customers with RemoteAccessTrojan; potential network intrusion;served as model for SaaS attacks.Remove the backdoored update; patch 3CX to clean versions; reset tokens/keys; review 3CX’s DevSecOps practices (employee malware scanning).
    Jul–Aug 2025[11][12]Salesforce platforms (Enterprise CRM SaaS)OAuth abuse/vishing: Attackers used stolen credentials and social engineering (vishing) to trick employees into approving malicious Connected Apps or tokens[13].Criminal syndicate (Scattered Spider, ShinyHunters)[14]Unauthorized API-level data export from ~90+ organizations across sectors (tech, retail, etc.)[15]. Massive CRM data theft and breach notifications.Revoke and rotate all OAuth tokens and app credentials; require MFA on sensitive operations; retrain staff on vishing; review and restrict 3rd-party app permissions.
    Aug 8–18, 2025[16]Salesloft/Drift (Salesforce integration)OAuth token theft: Threat actors stole valid OAuth tokens from the Drift chatbot integration, inheriting trusted API access[17].Cybercriminal group (UNC6395)Over 700 customer Salesforce accounts (and other connected apps) compromised via stolen tokens[18], exposing CRM and email data.Salesloft revoked all Drift tokens and removed app; customers rotated credentials; implement stricter token lifetimes and monitoring of 3rd-party integrations.
    Aug 2025[19][1]Miljödata (Swedish HR software vendor)Ransomware and data-exfiltration attack on Miljödata’s cloud servers[20].Claimed by DataCarry (ransomware group)Systems offline at ~200 Swedish municipalities (80% of councils)[1]; employee records, medical certificates at risk[21]; multi-day outages.Incident response: systems recovery and decryption; police/CERT involvement; all councils switched to manual processes; later rebuild on new infrastructure and tighten vendor security.
    Sep 8, 2025[22][23]npm (JavaScript package ecosystem) – debug, chalk and 16 other librariesPhishing of npm maintainers enabled attackers to publish malicious updates inserting crypto-wallet-stealing code[24][23].Likely financially motivated cybercriminals (cryptocurrency theft)Millions of downstream apps risked including malicious code; user wallets and credentials could be compromised; supply-chain exposure for JS apps.Revert to pre-attack package versions (lockfiles); require MFA on repository publishing; audit all npm accounts; use package integrity checks.
    Sep 20–29, 2025[25][26]npm ecosystem (widespread) – code-publish worm (“Shai-Hulud”)Credential-stealing npm worm spread via automatic package updates, injecting backdoors into hundreds of packages[25][26].Unknown (likely cybercrime syndicate)Potential mass compromise: developers unwittingly published malcode; exfiltration of environment credentials; broad trust erosion in npm packages.Organizations rotated all registry/API keys, killed malicious processes; upgraded dependencies to clean versions; enable 2FA on package repos; deploy registry monitoring for unusual publishes[25].
    Jan 28, 2026[27][28]dYdX v4 client libraries (npm & PyPI)Developer account compromise allowed attackers to publish backdoored versions of @dydxprotocol/v4-client-js (npm) and dydx-v4-client (PyPI)[27].Unknown (criminal threat actor; likely same as 2022 dYdX attack)Injected wallets-stealer (JS) and RAT (Python) targeting crypto users[28]; hundreds of thousands of downloads at risk; major crypto theft potential.dYdX issued patch notices and disabled malicious releases; users urged to isolate machines, rotate API keys, move assets to new wallets[29]; strengthen publisher account security (MFA).
    Mar 19–27, 2026[30]Multiple tools (Trivy, npm, LiteLLM, Telnyx, etc.)The “TeamPCP” campaign sequentially compromised build tools and registries via stolen CI credentials. By Mar 24–27, malicious versions of Python packages LiteLLM and Telnyx were published on PyPI[30].Unknown hacking collective (self-styled “TeamPCP”, possibly nation-state)Latent credential theft across thousands of systems; deployed sophisticated Linux backdoor (Kubernetes malware)[31]; ~500K devices exfiltrated credentials[32].Immediate remove/pin packages to safe versions; rotate all CI secrets and tokens; conduct forensic analysis on CI servers; publish IOCs and patches; apply updated SBOMs to detect infected builds.

    *Italicized items are older but instructive examples.

    Threat-Actor Profiles

    Nation-States: State-sponsored groups target supply chains for espionage or sabotage. They often conduct long-term intrusion campaigns, quietly inject backdoors into widely-used code or hardware, and leverage compromised trust to reach ultimate targets. For example, the XZ Utils backdoor was likely orchestrated by a hidden actor who maintained project access for years[6], and the 3CX compromise (Mar 2023) was attributed to a North Korean group[10]. States use sophisticated TTPs: compromising build pipelines or OSS projects, embedding subtle malicious logic (e.g. SSH backdoors), and covering tracks. Malware may sit dormant or trigger only under certain conditions. The goal is usually intelligence or positional advantage, not immediate financial gain.

    Criminal Cyber-Gangs: Financially motivated cybercriminals exploit supply chains to maximize profit. Ransomware gangs (SafePay, DataCarry, etc.) or credential-stealers (Scattered Spider/ShinyHunters, TeamPCP, etc.) will infiltrate service providers, open-source libraries or CI/CD tools. Their TTPs include phishing developers, exploiting third-party SaaS, or deploying crypto-mining/backdoor malware. For instance, ShinyHunters and Scattered Spider targeted Salesforce via vishing (OAuth abuse) to steal customer data[14], and TeamPCP used stolen CI tokens to inject crypto-wallet stealers into widely-used tools[32]. These actors move quickly to monetize breaches (ransom payments, crypto theft) and may publicly leak data to extort victims. Their attacks are high-volume and opportunistic: hundreds of npm/PyPI projects and thousands of downstream apps have been hit with wallet-stealing code in 2025–26[27][32].

    Insiders and Rogue Developers: Trusted insiders or compromised maintainers pose a unique risk. A developer with commit rights can insert malicious code directly. The XZ Utils incident shows an (unknown) maintainer pushed a backdoor under the guise of a feature[33]. Similarly, npm packages debug and chalk were hijacked by attackers who phished maintainer accounts[24]. Even without malice, careless practices (e.g. reusing credentials) can enable outsiders to take over. Insider threats demand strict code-review, policy enforcement, and incident response readiness (e.g. stop shipping if anomalous code is detected).

    Supply-Vendor Providers: Third-party software and service vendors can become adversaries’ beachheads. When a key vendor is breached, all its customers can be collateral damage. Recent examples: Ingram Micro’s ransomware outage (July 2025) disrupted global IT distribution, affecting countless resellers[34]. Miljödata’s ransomware (Aug 2025) instantly locked out 200 Swedish municipal governments[1]. Attackers know a single point of supply can cascade: compromising one cloud provider or SaaS vendor multiplies impact. Vendors themselves are usually targeted by criminals or state actors; their compromised services then “push” malicious updates or files to clients. This makes robust vendor risk management (assess security posture, require breach notification, etc.) essential.

    Technical and Business Fallout

    Supply chain compromises lead to data exfiltration (theft of sensitive credentials or IP) and backdoor deployments across large user bases. For example, TeamPCP’s PyPI backdoors harvested SSH keys, cloud tokens and crypto wallets from hundreds of thousands of systems[32], and the npm “Shai-Hulud” worm stole developer secrets from environments to spread further[31]. Hackers often implant persistent malware; in the TeamPCP case, infected Kubernetes clusters would wipe themselves if in Iran or install rootkits elsewhere[31]. Even if ransomware is not deployed, many breaches involve unauthorized data collection, as in Sisense (customer tokens for analytics)[9] and Salesforce breaches (CRM data)[15].

    Business impacts are severe. Service disruption can cascade widely: Miljödata’s hit took down HR and medical record systems for hundreds of municipalities[1], and Ingram Micro’s outage halted global software licensing and hardware distribution[34]. Inventory backlogs and operational losses can reach hundreds of thousands of dollars per hour, and full recovery costs often exceed $4–10 million[2]. Companies face reputational damage and customer churn when a breach becomes public. Regulatory consequences (e.g. GDPR fines for data loss, reporting obligations) and legal liability (customer lawsuits) often follow. For instance, Sweden’s government had to promise new cybersecurity rules after Miljödata[35].

    The downstream effects can be even larger. When a trusted update or vendor service is poisoned, all downstream partners and customers are at risk. The Sisense and Salesloft/Drift incidents potentially exposed hundreds of organizations[9][18]; SolarWinds (2020) and MOVEit (2023) supply chain attacks exposed data in the millions. In a recent study, ~30% of breaches were linked to third parties[36]. Companies relying on affected vendors had to scramble to audit their own systems, rotate keys, and reassure clients. In short, a single compromised supplier can result in widespread outages, stolen data, and heavy financial and operational losses for its entire ecosystem.

    Detection, Prevention, and Response Recommendations

    1. Secure Development and Build Practices. Enforce strict code review and change-control. Use reproducible builds and verify that source code matches compiled artifacts[37]. Isolate CI/CD systems: run builds in locked-down VMs, use ephemeral credentials, and rotate secrets regularly. Require phishing-resistant multi-factor authentication (MFA) for all developer and vendor portal accounts[38]. Limit privileges so build systems and package registries only run needed commands (principle of least privilege). Maintain software bills of materials (SBOMs) for all products and dependencies; generate a fresh signed SBOM for each build[3][4]. SBOMs create a dynamic inventory to quickly identify when a component is compromised[39][3].

    2. Code Signing and Integrity. Sign all code and package releases. As one guide notes, “code signing is usually the last line of defense”[4]. Protect private keys with hardware tokens and store them offline. Verify signatures of third-party components before use. For SBOMs, use the same cryptographic signature as the software (or a dedicated key) so that SBOMs themselves are tamper-evident[40]. This ensures downstream users know the provenance of each component[40][4].

    3. Continuous Monitoring and Telemetry. Deploy robust logging and anomaly detection in vendor environments and critical infrastructure. Monitor build servers for unusual workflows or network activity. Network security tools should flag unusual outbound traffic or connections from developer machines (which may indicate credential exfiltration). Use Endpoint Detection and Response (EDR) on build agents and developer workstations. Instrument container registries and package repositories with alerts (e.g. for mass publish events or new versions of critical libraries). Maintain visibility across the supply chain by sharing SBOM data and VEX (Vulnerability Exploitability eXchange) feeds[41]. The goal is to detect malicious activity early, such as the TeamPCP compromise where stolen credentials were reused across projects[31].

    4. Vendor Risk Management. Institute a formal third-party security review process. Require evidence of secure development practices (e.g. signed SBOMs, audited supply chain controls) from critical suppliers. Include contractual clauses for breach notification and vulnerability patching SLAs. Group vendors by risk; high-impact suppliers (like Miljödata or Ingram Micro) need continuous oversight. Regularly scan vendor-released software for known vulnerabilities and embedded malware. Consistently update the inventory of all software and hardware dependencies.

    5. Incident Response Playbooks and Forensics. Build and test incident-response plans specific to supply-chain breaches. Key steps include isolating affected systems, preserving forensic evidence, and identifying all compromised artifacts and credentials. Forensic actions may involve memory dumps of CI servers, image captures of infected machines, and parsing build logs to trace malicious commits or publishes. Engage forensic specialists to reverse-engineer any discovered malware payload (as Endor Labs did for LiteLLM[42]). Maintain legal readiness: know notification obligations (e.g. regulators, law enforcement) and have pre-crafted communication templates for customers and media. The playbook should detail when to rebuild from known-good sources and when to simply patch or revert updates.

    6. Monitoring and Anomaly Detection (Business Continuity). In parallel, have network and application monitoring to spot downstream impacts. For example, if thousands of workstations simultaneously attempt to connect to a suspicious domain (as TeamPCP malware did[31]), automated alerts should trigger containment (e.g. blocking the C2 domain). Use Data Loss Prevention (DLP) tools to detect mass exfiltration of credentials or documents. Regularly audit accounts and keys for unauthorized creation or usage.

    7. Communication and Legal Preparedness. Prepare communication plans for supply-chain incidents: include guidelines for public disclosure, customer notifications, and regulatory filings. Legal teams should understand breach reporting laws in each jurisdiction. For example, GDPR and some U.S. states have strict timelines once personal data is exposed. Engage PR or crisis comms early to maintain trust (explain what’s known/unknown). Coordinate with law enforcement (e.g. FBI/CISA in the U.S., CERTs internationally) which often have supply-chain incident intelligence. Forensics results should feed into the public notice (e.g. “no evidence of customer data stolen” as Miljödata claimed[43]) and regulatory filings.

    Prioritized Checklist: 1. Immediate: Rotate and revoke all potentially compromised credentials or certificates; isolate affected systems.
    2. Short-term: Apply patches/rollbacks (e.g. downgrade xz-utils)[44], and update to secure dependencies. Notify stakeholders and regulators per policy.
    3. Mid-term: Audit SBOM inventory for affected components; use scanning tools to find “patient zero” deployments. Apply hardening (MFA, network segmentation).
    4. Long-term: Enhance development pipeline security (MFA, code signing, least privilege) and vendor contract requirements. Conduct post-incident review to update threat models and playbooks.

    Table: Comparison of Key Mitigations

    MitigationPurpose & BenefitLimitations / Notes
    SBOM Inventory & ScanningEnables rapid impact assessment by listing all components[3]; tracks vulnerabilities across releases[39].Only as good as it’s kept up-to-date; must be paired with active patching[41].
    Code/Package SigningVerifies authenticity of software updates (prevents unauthorized code)[4].Requires secure key management; if private keys are stolen, trust is broken.
    MFA & Least PrivilegeProtects developer accounts and CI/CD systems from takeover[38]; limits damage from credential theft.User friction; must ensure phishing-resistant methods (e.g. hardware tokens).
    Continuous MonitoringDetects anomalies (unusual network egress, mass file changes) in real-time[45].Reactive measure; sophisticated attacks may evade simple thresholds.
    Vendor Security AssessmentsProactively reduces risk by vetting suppliers’ practices and response plans.Time-consuming; vendors may lack maturity or transparency.
    Runtime Protection(e.g. EDR, network DLP) Blocks or alerts on malicious activity in production.May not catch pre-deployment threats; requires tuning to avoid false positives.

    References: Official advisories and research papers have documented these incidents and recommendations[5][8][1][30][3][4]. These sources and others (CISA, NSA/NCSC alerts) form the basis of the controls and analyses above. All technical specifics and quotes are drawn from the cited primary reports.


    [1] [21] [35] [43] Ransomware crooks knock Swedish councils offline over $168K • The Register

    https://www.theregister.com/2025/08/28/sweden_council_ransomware

    [2] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [34] [36] Top 10 Supply Chain Attacks of 2025

    https://socradar.io/blog/top-10-supply-chain-attacks-2025

    [3] [40] SBOMs and the importance of inventory | National Cyber Security Centre – NCSC.GOV.UK

    https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory

    [4] [41] NSA, CISA call on software developers, suppliers to improve open source software management practices – AFERM Resource Library

    https://resources.aferm.org/erm_feed/nsa-cisa-call-on-software-developers-suppliers-to-improve-open-source-software-management-practices/

    [5] [7] [33] [44] CISA, Red Hat Warn About Supply Chain Compromise Affecting Linux Distributions

    https://www.crn.com/news/security/2024/cisa-red-hat-warn-about-supply-chain-compromise-affecting-linux-distributions

    [6] XZ Utils Backdoor — Everything You Need to Know, and What You Can Do | Akamai

    https://www.akamai.com/blog/security-research/critical-linux-backdoor-xz-utils-discovered-what-to-know

    [8] [9] [10] Sisense breach exposes customers to potential supply chain attack | CyberScoop

    https://cyberscoop.com/sisense-supply-chain-breach/

    [22] [23] [24] npm Supply Chain Attack: Massive Compromise of debug, chalk, and 16 Other Packages – Upwind

    https://www.upwind.io/feed/npm-supply-chain-attack-massive-compromise-of-debug-chalk-and-16-other-packages

    [25] [26] [38] Widespread supply chain compromise impacting npm ecosystem

    https://www.ncsc.govt.nz/alerts/widespread-supply-chain-compromise-impacting-npm-ecosystem

    [27] [28] [29] Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

    https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html

    [30] [31]  LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign | Datadog Security Labs

    https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign

    [32] [42] Popular LiteLLM PyPI package backdoored to steal credentials, auth tokens

    https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack

    [37] [45] Oligo

    https://www.oligo.security/academy/supply-chain-attack-how-it-works-and-5-recent-examples

    [39]  CISA, NSA, global partners release SBOM Guidance urging cross-border adoption to boost software supply chain security – Industrial Cyber

    https://industrialcyber.co/sbom/cisa-nsa-global-partners-release-sbom-guidance-urging-cross-border-adoption-to-boost-software-supply-chain-security/

  • Emerging Cybersecurity Threats in 2026

    Executive Summary

    The first quarter of 2026 has seen cyber threats accelerate in complexity and scope. AI-enhanced attacks, automated initial access, and supply-chain compromises are prominent. Ransomware continues adapting (e.g. “recovery denial” tactics against backups[1]) while nation-state actors escalate stealthy incursions into critical infrastructure (e.g. recent Russian Sandworm wipers on Polish power grids[2]). Major reports (Mandiant M-Trends 2026, Unit 42 IR Report, CrowdStrike, Cisco Talos, Cybersecurity Dive) converge on key themes: AI as a force multiplier, identity and credential abuse, exploitation of edge/cloud/OT systems, and diverse ransomware/espionage operations. In Q1 2026, high-tech and financial firms remain top targets[3], but manufacturing, healthcare and utilities have seen surges (manufacturing attacks +30% YoY[4]). We observe persistent phishing (including voice phishing) and vulnerability exploits, often leading to credential theft and rapid lateral movement. Forward-looking threats include AI-driven malware, new zero-days, cloud/SaaS abuses, and expanded supply-chain attacks (e.g. PyPI compromise[5]). Defenders should prioritize rapid patching, robust identity/credential controls (Zero Trust, MFA), segmentation, and AI-enabled detection.

    1. Top Emerging Threats (2026)

    • AI-Accelerated Attacks: Adversaries increasingly leverage AI to scale and refine attacks. Generative AI is used for hyper-realistic phishing (emails, vishing), malware generation and vulnerability exploitation[6][7]. Cisco Talos notes attackers automate exploit chains (“scan for new CVE in 15 minutes”)[8]. CrowdStrike reports an 89% jump in AI-enabled attacks (2025 vs 2024)[9]. AI amplifies social-engineering and speeds breach timelines (fastest recorded breakout = 27 seconds[9]).
    • Cloud and Edge Exploits: Threat actors target unmanaged devices and cloud environments. A full 40% of vulnerabilities exploited by China-related groups were in edge or IoT devices[9]. Cloud intrusions are soaring: CrowdStrike notes a 266% increase in state-linked “cloud-conscious” attacks[9]. SaaS and API abuse is rising – attackers steal OAuth tokens and exploit misconfigurations to move laterally across cloud platforms[1][10].
    • Supply Chain Compromises: Recent campaigns show attackers breaching software and development supply chains. For example, March 2026 saw malicious Python packages on PyPI for Telnyx, Trivy, LiteLLM and Checkmarx, hijacking trusted software distributions[5]. Package threats (NPM/PyPI), CI/CD pipeline exploits, and vendor-tool attacks are emerging vectors (Talos cites SaaS integrations and trusted connectivity abuses[10]).
    • Automation and Tooling: Criminal ecosystems are maturing. Ransomware syndicates operate like businesses (RaaS with developer/affiliate split[11]). New tools and malware families proliferate: Mandiant notes 714 new malware families and 660 new threat clusters in 2025[12]. Modular attack kits (phishing-as-a-service) and AI-enabled malware testing/debugging are on the rise (Zscaler reports industrial-scale phishing kits and AI coding risks[6][13]).
    • Operational Technology (OT) and ICS: Nation-state groups are expanding into OT. A Russia-linked intrusion in Jan 2026 “bricked” (permanently damaged) ICS devices at Polish distributed energy resources[2][14]. Pro-Russian hacktivists and APTs are probing European energy grids and manufacturing OT, exploiting weak HMIs and IoT controllers[15][2]. These highlight a shift from IT breaches to disruptive OT operations.

    Scope & Impact: The threats above have global reach. Mandiant’s Q1 data show median dwell times at 14 days (up from 11)[16], with some espionage cases persisting ~122 days. The “hand-off” model has accelerated: initial access often yields full network control in seconds (Mandiant: compromise-to-launch in 22 sec)[17]. Many intrusions blend tactics (Talos: 87% involve multiple attack surfaces[18]). The impact includes large data thefts, R&D/IP loss, national-critical service outages, and broad supply-chain disruptions (e.g. the Jaguar Land Rover factory shutdown cost £2.5B[19]).

    2. Major Threat Actors (2026 so far)

    Actor / GroupTypeOrigin/TargetsMotivation & Profile
    LockBit (Warlock)RansomwareGlobal (Finance, Tech, Manufacturing)Prolific RaaS. Continually evolves variants (post-seizure recovery). Targets virtualization to cripple backup recovery[11]. Financial extortion via extortion-only data leak.
    Qilin (Agenda)RansomwareGlobal (Finance, Tech)Russian-speaking gang, known for large data extortions. Released a Rust rewrite for obfuscation. Focus on high-impact targets and backup deletion (“recovery denial” tactics[1]).
    Akira / RedibikeRansomwareGlobal (Critical Infra)Emerged post-Ryuk. Moved to C++ for stability[11]. Targets municipalities and infrastructure with encryption.
    DragonForce (Diavol)RansomwareGlobalHigh-volume RaaS (evolved from Hive). Commercial-scale affiliate model[11]. Targets paywalled extortion.
    Cl0pRansomwareGlobal (Tech, Finance)Pioneered fileless “crypt-less” extortion (e.g. MOVEit, Oracle EBS exploits)[20]. Thirsts for high-value data and identity-theft (hashed email attacks). Now favoring direct C-suite extortion.
    Scattered SpiderHybrid (IT/OpSec)Primarily US/UK (Retail, Tech)Notoriously executes highly-spearphished breaches. Uses native-English social engineering (e.g. 2019 Okta breach). Combines phishing with cloud compromise (e.g. MFA/SSO hijacking). Arrests notwithstanding, still adapts.
    Lazarus GroupState-Aligned (NK)Global (Finance, Crypto, Defense)North Korea’s premier APT. Financier through record thefts ($2B in 2025)[21]. Has launched NexusKudos banking heists and potentially next-gen OT attacks.
    Volt TyphoonState-Aligned (PRC)US/Allied Critical InfrastructureChinese-affiliated APT. Long-term stealth operations in US energy/telecom. Living-off-land (LOLBINs, credential theft) to maintain persistence[21]. Emphasizes intel gathering and strategic disruption over immediate gain.
    APT29 (Cozy Bear)State-Aligned (RU)Western Gov/InfraRussia’s stealthiest espionage unit. Active in elections and NATO energy networks. Focuses on espionage and subversion via identity theft and VPN exploits.
    OilRig (APT34)State-Aligned (IR)ME Energy / TelecomIran’s cyberespionage arm. Targets energy grids, military, and political opponents. Known for web shells, VPN compromises, and desynchronization attacks (e.g. gas facilities).
    LAPSUS$ HuntersHacktivist/CriminalGlobal (Tech, Gaming)Loose “hacktivist” clusters (Unaffiliated from original LAPSUS$). Conduct high-profile social-engineering breaches (Nvidia, Okta 2022). Claim ideological motives (anti-corporate, nation-linked propaganda).
    Anonymous AffiliatesHacktivistGlobal (Conflict Zones)Decentralized hacktivist cells (pro-Ukrainian, pro-Palestinian, etc). Engage in DDoS, defacements, leaks tied to conflicts. Recent NCSC alerts warn of Iranian proxy/hacktivist threats to Western orgs[22].

    Profiles & Motivations: The above actors span pure criminals, nation-backed espionage, and ideologues. Ransomware gangs (LockBit, Qilin, etc.) operate as industrialized businesses, quickly retooling (LockBit even after takedowns[11]). They maximize impact via multi-pronged extortion (data leaks, backup sabotage). “Hybrid” groups like Scattered Spider and Cl0p fuse organized crime tradecraft with APT-like targeting: Cl0p exploited MOVEit/Oracle flaws to steal massive data troves[20]. State-aligned APTs (Lazarus, Volt Typhoon, APT29, OilRig) use persona-based infiltration (fake hires, covert credentials) and novel persistence (e.g. hypervisor/rootkit malware[23]). Many seek long-term footholds for intelligence or disruption. Hacktivist collectives have grown more capable, quickly mobilizing around global flashpoints and even disrupting OT (Waterfall report cites ICS intrusions by pro-Russian hacktivists across Europe[15]).

    3. Key Trends (Jan–Mar 2026) and Trajectories

    • Rapid Attack Lifecycle: The “time-to-encrypt” is shrinking. Unit 42 reports exfiltration speeds quadrupled in 2025[7]; CrowdStrike cites a record 27-second ransomware breakout[9]. Mandiant confirms a median “hand-off” of only 22 seconds from compromise to attacker control[17] (versus hours in 2022). These figures highlight a shrinking detection window: what happens in the first minute can determine breach outcome.
    • Phishing Evolves: Email phishing remains ubiquitous, but voice phishing (vishing) is surging. Mandiant found voice-based social engineering in ~11% of cases (up from near-zero)[16]. UNC3944 exemplifies this: threat actors impersonate employees via phone to trick helpdesk staff into password/MFA resets[24]. Simultaneously, attackers employ OAuth and platform exploits to bypass email filters[13].
    • Identity & Credentials as Keys: Attacks increasingly hinge on stolen or forged identities. Unit 42 observed that ~90% of incidents leveraged valid accounts or credential compromise[7]. Cloud/SaaS credential theft and long-lived tokens enable lateral movement across environments. Reports note CRM/API abuses and legitimate tool compromise (e.g. valid admin tokens in Atlassian, Okta breaches). Weak MFA uptake and unused legacy credentials remain common roots of compromise.
    • Exploits of Known Vulnerabilities: Timely patching is critical. Talos IR data for Q4 2025 shows 40% of cases began with exploitation of public-facing software[25]. Newly disclosed flaws (Oracle EBS CVE-2025-61882, React2Shell CVE-2025-55182) were weaponized within hours of release[25]. This “exploit-first” behavior has continued into 2026 – CISA added seven newly exploited CVEs to its catalog in Jan 2026 (including a Microsoft Office RCE)[26].
    • Ransomware Adaptation: While the quantity of incidents (13% of IR cases in Q4 2025[27]) dropped, quality increased. Ransomware groups now routinely deny recovery (deleting backups, abusing AD CS certificates) rather than merely encrypting data[1]. The “Recovery Denial” trend forces broader impact (full system rebuilds). Leak site activity remains brisk (Qilin/Agenda became top exfil brand by late 2025[28]).
    • Detection & Response: Internal detection is improving: Mandiant notes 52% of intrusions were discovered by victim organizations (vs. 43% prior year)[29], thanks to better telemetry and hunting. However, nearly all breaches exploit preventable gaps (poor segmentation, outdated patches, misconfigurations)[30]. Notably, many alerts precede major breaches – Mandiant emphasizes treating “low-impact” alerts as urgent indicators[31]. Organizations are also leveraging AI defenders (agentic detection) in response to AI-driven offense[32].

    timeline
        title 2026 Cybersecurity Events (Jan–Mar)
        2026-01-23: Netlas publishes Top 10 Threat Actors 2026 report
        2026-01-28: CrowdStrike/CISA Annual Outlooks highlight AI & cloud threats
        2026-01-30: Russian-linked Sandworm “Electrum” attack bricking Poland’s grid[2]
        2026-03-02: NCSC warns UK organizations to prepare for Iran-linked cyber threats[33]
        2026-03-27: Telnyx discloses malicious PyPI SDK versions (part of supply-chain campaign)[5]

    4. Affected Industries (Q1 2026 and Why)

    Several sectors stand out in early 2026:

    IndustryThreat Overview & RisksEvidence / Sources
    ManufacturingMost-targeted sector. Complex OT environments (IT/OT convergence) and IP-rich supply chains make mfg. a prime target[4]. Ransomware surged (+30% attacks YoY)[4]; attacks on Jaguar Land Rover and US steel (Nucor) proved devastating (weeks-long shutdown, $2.5B UK loss)[19]. Many firms lack segmentation; legacy equipment is common.[4][19] (embed image)
    High TechnologyGlobal R&D and data centers are prized by espionage and crime. Mandiant found high-tech firms were the top target (17% of intrusions)[3]. Tech companies’ cloud/IP assets attract both ransomware (pre-lock) and APTs (for R&D theft).[3]
    Finance / BankingPersistent target due to monetary assets. Thieves target online banking, SWIFT systems, and crypto exchanges. Mandiant’s data shows finance ~14.6% of breaches[3]. Lazarus’s $2B crypto heist exemplifies NK targeting of finance[21].[3][21]
    Healthcare / Life SciencesHigh-stakes data. PHI exposure drives extortion. Cyble reports hospitals enduring repeated encryptions and PHI leaks[34]. BYOD and legacy medical systems (often unpatched) elevate risk. Additionally, pharm/biotech companies are APT espionage targets (IP theft of research/vaccines).[34]
    Energy & UtilitiesCritical infrastructure. Recent Sandworm attacks on power grids (Poland) and past Ukraine outages underscore vulnerability[2]. ICS/OT systems (substations, renewables, pipelines) are now in scope. Attackers exploit weak ICS devices and supply-chain (e.g. vulnerabilities in SCADA components[35]). Nation-state actors (China’s VoltTyphoon, Iran’s OilRig) actively probe these sectors.[2][35]
    Telecom / Gov’tTelecom firms hold vast user data; breaches risk PII theft and surveillance. Governments remain APT targets (elections, espionage). Notably, hacktivists (e.g. pro-Palestinian) are eyeing public sector bodies.(General industry consensus)


    Manufacturing facilities are among the most attacked sectors. Recent incidents like Jaguar Land Rover’s multi-week outage (data stolen, £2.5B losses) illustrate how cyber disruptions in manufacturing ripple through supply chains[19].

    Different sectors face different motivators: manufacturers’ value lies in trade secrets and untimed production; financial services guard funds; healthcare has indispensable personal data; utilities must ensure continuous service (and are now targeted for geopolitical leverage). In many cases, weaknesses are sector-specific: for example, manufacturing’s reliance on legacy OT (SCADA, IoT controllers) makes them vulnerable to ICS-targeting malware[15], while tech firms often have extensive cloud infrastructures (a honeypot for SaaS token theft).

    5. Prevalent TTPs and IoCs (Jan–Mar 2026)

    The attacker playbook remains rooted in core techniques, but with evolving flavors. Below are key TTPs observed, MITRE mappings, examples, and mitigations:

    Tactic / TechniqueMITRE ATT&CK IDExample & IoC (Q1 2026)Detection / Mitigation Recommendations
    Exploitation of Public-Facing Apps<br>(web servers, apps)TA0001 / T1190Oracle E-Business Suite RCE (CVE-2025-61882) – rapidly exploited on unpatched servers[25]. SharePoint RCE (CVE-2025-53770/1) used by threat cluster UNC6357.Action: Timely patching and network segmentation for internet-facing systems[25]. Use WAF/filters. Monitor web logs for unusual uploads or shell deployments.
    Phishing (Email & Voice)TA0001 / T1566 (Email), T1606 (Voice)Spearphishing emails remain a top vector. Voice phishing (vishing) incidents increased (e.g. UNC3944’s helpdesk calls to reset MFA[24]). IoCs: known malicious email domains, phone numbers.Action: Enforce MFA for all logins. Security awareness and training on vishing. Deploy anti-phish gateways. Alert on anomalous account reset requests.
    Valid Accounts / Credential TheftTA0006 / T1078 (Valid Accounts), T1003 (Cred. Dumping)Threat actors steal admin/user credentials to move laterally. Mandiant saw many backdoors (Cobalt, GoldVein stealer) and AMSI-bypassing malware (BRICKSTORM backdoor on routers)[23]. IoCs: hashes for known loaders (GoldVein.JAVA was top malware of 2025[12]).Action: Monitor authentication logs for odd behavior (off-hours logins, geolocations). Limit admin rights (zero trust). Use endpoint protection to flag credential dumping tools. Restrict Powershell/LSASS access.
    Lateral Movement / Privilege EscalationTA0003 / T1078, T1136, T1110 (Password Spraying)AD abuse: Attackers exploit AD Certificate Services to forge admin accounts and delete backups[1]. IoCs: creation of unusual privileged accounts or suspicious certificate issuances.Action: Audit AD CS templates; enforce tiered admin model (treat hypervisor/AD as Tier 0)[1]. Employ MFA on admin tasks; log and alert on new high-priv accounts or service certificate changes.
    Impact (Ransomware / Data Destruction)TA0040 / T1486 (Encrypt Data), T1485 (Destroy Data)Ransomware encryption and backup wipes: Qilin/LockBit variants continue extortion campaigns. Mandiant notes many now destroy backups (Recovery Denial) instead of just encrypting[1]. Example: Ransomware strain name “Qilin” and “Threat Actor SAGE” webshell.Action: Maintain offline/immutable backups. Segment backup networks. Implement ransomware detection (monitor file encryption). Apply least privilege to backup services. Prepare incident response for system rebuild.

    References: These mappings align with industry reports (Mandiant, Talos, Unit42) and observed incidents[25][1][24][12]. Defenders should ensure detection coverage (EDR, NAC, SIEM alerts) for the above TTPs and IoCs (e.g. add known bad hashes and C2 IPs into blocklists, see Telnyx IOCs[36]).

    6. Forward-Looking Watchlist (Rest of 2026)

    • AI/ML Threats: What’s Next: Attacker use of AI will mature. Expect new AI-generated malware (autonomously mutating code), “deepfake” voice/screen phishing, and LLM-powered reconnaissance. There’s also risk from AI agent misconfigurations: insecure coding assistants and rogue AI bots could create novel vulnerabilities[37].
      Defender Actions: Invest in AI-based detection (agentic security)[32], monitor unusual data exfil through AI services, and enforce strong oversight on internal AI tools.
    • Software & Supply Chain: What’s Next: Attacks via software dependencies will continue (e.g. npm/PyPI, container registries). Recent Telnyx/Trivy incidents show credential chaining in dev tools[5]. Emerging targets include open-source ML libraries (LiteLLM) and third-party dev frameworks.
      Defender Actions: Enforce strict code repository controls, use SBOMs (software bill of materials), pin dependency versions, and monitor for unexpected changes in third-party libraries. Follow CISA/NIST guidelines on supply-chain security.
    • Zero-Day Exploits: What’s Next: As 5G, IoT, and crypto systems proliferate, expect high-value zero-days (especially in network, virtualization, IoT stacks). Mandiant flagged that new zero-days already drove “widespread exploitation” in 2025[38].
      Defender Actions: Subscribe to threat intel feeds and CISA KEV list (as in Jan 2026)[26]. Use virtual patching/firewalls to mitigate unknown vulns. Increase monitoring on unusual system behavior that could indicate new exploits.
    • Cloud & OT Convergence: What’s Next: Hybrid threats will blur lines: expect cloud breaches causing physical outages (and vice versa). APTs will exploit poorly-secured 5G/Edge devices to pivot into enterprise networks. Autonomous systems (IoT, EV charging networks) present new attack surfaces[39].
      Defender Actions: Extend Zero Trust to OT environments. Network-segment cloud/OT, apply strong identity controls even on machine-to-machine accounts. Conduct regular cyber-physical resilience drills and ICS incident simulations.

    Prioritized Recommendations for Defenders:
    1. Strengthen Identity & Access Controls: Enforce multi-factor authentication everywhere, adopt least privilege, and segment privileged roles (Zero Trust). Monitor for anomalous login activity.
    2. Patch and Update Rigorously: Prioritize public-facing and critical systems. Accelerate response to new CVEs and KEVs (e.g. Office, Cisco, VMware flaws). Use virtual patching where immediate fixes aren’t available[25].
    3. Backup & Recovery Hardening: Implement immutable, offline backups and air-gapped recovery processes. Test restores regularly. Prepare incident playbooks for rapid restoration.
    4. Enhance Visibility: Deploy comprehensive logging/EDR/XDR with cloud/OT coverage. Leverage threat hunting (using known IoCs from recent attacks like Telnyx[36], Brickstorm backdoor indicators, etc.). Consider AI-based anomaly detection.
    5. Secure the Supply Chain: Vet third-party vendors and dev practices. Adopt SBOMs for software inventories. Train developers on secure coding (especially for AI-assisted development).
    6. Incident Preparedness: Coordinate with ISACs and regulators. Educate staff on evolving social-engineering (voice phishing, AI deepfakes). Conduct red-team exercises emulating top threats (e.g. ransomware ACL, APT lateral movement).

    Staying ahead in 2026 means anticipating the industrialization of threats: attackers will use AI, supply-chain exploits, and cross-domain tactics to maximize impact. By hardening identity, patching aggressively, and monitoring creatively, defenders can raise the cost of attacks and detect compromise before it escalates.

    Sources: Authoritative threat reports and advisories from Mandiant (Google Cloud M-Trends 2026)[16][1], CrowdStrike[9], Palo Alto Unit 42[7], Cisco Talos[25], Zscaler[6], CISA/NCSC alerts[22][26], cybersecurity news (Cybersecurity Dive[4], SecurityWeek[2], Cyble/Waterfall report[15], Telnyx security bulletin[5]), and others as cited.


    [1] [3] [16] [17] [23] [29] [31] M-Trends 2026: Data, Insights, and Strategies From the Frontlines | Google Cloud Blog

    https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026

    [2] [14] ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid – SecurityWeek

    https://www.securityweek.com/ics-devices-bricked-in-russia-linked-strike-on-polish-power-grid

    [4] [19] Manufacturers fortify cyber defenses in response to dramatic surge in attacks | Cybersecurity Dive

    https://www.cybersecuritydive.com/news/manufacturing-sector-cyber-threats-collaboration-ransomware/810930

    [5] [36] Telnyx Python SDK Security Notice: Malicious PyPI Versions Identified (March 2026)

    https://telnyx.com/resources/telnyx-python-sdk-supply-chain-security-notice-march-2026

    [6] [32] CXO Monthly Roundup, January 2026: Zscaler ThreatLabz AI Security

    https://www.zscaler.com/cxorevolutionaries/insights/cxo-monthly-roundup-january-2026-zscaler-threatlabz-ai-security-report-new-apt-campaigns

    [7] [8] [10] [18] [30] 2026 Unit 42 Global Incident Response Report – Palo Alto Networks

    https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report

    [9] CrowdStrike 2026 Global Threat Report: Executive Summary

    https://www.crowdstrike.com/en-us/resources/reports/global-threat-report-executive-summary-2026

    [11] [20] [21] Top 10 Critical Threat Actors to Watch in 2026: Ransomware, APTs & Defensive Strategies – Netlas Blog

    https://netlas.io/blog/top_10_critical_threat_actors

    [12] [24] [28] [38] Attackers are handing off access in 22 seconds, Mandiant finds – Help Net Security

    https://www.helpnetsecurity.com/2026/03/24/mandiant-m-trends-2026-report/

    [13] [15] [34] [39]  Hacktivists and cybercriminals expand attacks on ICS, OT, and AI systems across critical infrastructure – Industrial Cyber

    https://industrialcyber.co/reports/hacktivists-and-cybercriminals-expand-attacks-on-ics-ot-and-ai-systems-across-critical-infrastructure/

    [22] Alert: NCSC advises UK organisations to take action following conflict in the Middle East | National Cyber Security Centre – NCSC.GOV.UK

    https://www.ncsc.gov.uk/news/ncsc-advises-uk-organisations-take-action-following-conflict-in-middle-east

    [25] [27] IR Trends Q4 2025: Exploitation remains dominant, phishing campaign targets Native American tribal organizations

    https://blog.talosintelligence.com/ir-trends-q4-2025

    [26] [35] (TLP:CLEAR) CISA ICS Advisories, Additional Alerts, Updates, and Bulletins – January 29, 2026 – WaterISAC

    https://www.waterisac.org/tlpclear-cisa-ics-advisories-additional-alerts-updates-and-bulletins-january-29-2026

    [33] NCSC Warns UK Organisations to Prepare for Potential Iran-Linked Cyber Activity – Security Boulevard

    https://securityboulevard.com/2026/03/ncsc-warns-uk-organisations-to-prepare-for-potential-iran-linked-cyber-activity/

    [37] Predicting 2026

    https://blog.talosintelligence.com/predicting-2026

  • Handala Threat Brief

    Executive Summary

    Handala (also Handala Hack Team) is a relatively new Iran-linked hacktivist persona that first emerged in late 2023. Purporting to fight for a “Free Palestine” digital agenda, Handala has claimed dozens of cyberattacks — most targeting Israeli and Western organizations — while employing destructive wiper malware and hack-and-leak tactics. Threat intelligence firms and U.S. agencies assess Handala to be a front for Iran’s Ministry of Intelligence and Security (MOIS) rather than an independent grassroots group[1][2]. This report collates open-source intelligence to profile Handala’s aliases, timeline, victims, motives, tools, infrastructure, tactics (MITRE ATT&CK-mapped), and indicators (IoCs), with source citations. Key confirmed/suspected incidents include the March 2026 Stryker Corp. attack and the March 27, 2026 breach of FBI Director Kash Patel’s personal email[3][4]. Handala favors deceptive phishing lures, supply-chain and credential attacks (notably abusing Microsoft Intune) to deploy custom wiper payloads and exfiltration implants (often using Telegram bots for C2)[5][6]. Major security vendors (Unit42, Check Point, Palo Alto, Trellix, etc.) provide technical analyses of Handala’s TTPs, which include spearphishing (T1566), credential compromise (T1078), process injection (T1055), and data destruction (T1486/T1561) mapped to MITRE ATT&CK. The threat’s infrastructure (domains, IPs, hosting, registrants) and many IOCs (file hashes, C2 URLs, IPs) have been documented by researchers and law enforcement (e.g. FBI domain seizures)[7][8].

    This report presents Handala’s timeline of activity (2010s–Mar 2026) and a comparison of major reports in tabular form. We detail known aliases and related actors, victimology (industries and geographies), motivations, and linking evidence to Iranian state agencies. Our TTPs section enumerates Handala’s techniques with MITRE IDs. We describe malware and tools (e.g. wipers Hamsa, Coolwipe, Chillwipe, Bibiwiper, HandalaWiper[5][9]; infostealers and loaders; use of AutoIT, NSIS, PowerShell, etc.) and outline a sample attack chain (the CrowdStrike-themed wiper campaign) with a mermaid diagram. The infrastructure section lists observed domains, IP ranges (notably Starlink/VPN), and hosting details. We compile an IOC table of relevant hashes, domains, and other artifacts[8]. Finally, we offer defense recommendations (e.g. phishing-resistant MFA, Intune hardening[10], network monitoring) and indicate confidence levels: attribution to Iran is assessed high-confidence (multiple consistent vendor analyses[1][2]), whereas some claimed hack impacts remain unverified/exaggerated (e.g. extent of leaked emails[11]). Missing details (e.g. identities of individual operators) are noted as unspecified due to lack of public information.

    Known Aliases and Related Actors

    Handala is often referred to as the “Handala Hack Team” (or simply Handala Hack) in its own communications and media reports[12][13]. It has been tracked by analysts as part of a larger cluster sometimes called Void Manticore (also “Storm-1084”/“0842”)[2][14]. Vendor reports and researchers list numerous alternate identifiers for this cluster: Homeland Justice (activity in 2022), Red Sandstorm, Cobalt Mystique, Storm-0842/1084, BANISHED KITTEN, Dune, and others[15][16]. For example, Microsoft attributed 2022 wiper attacks on Albanian agencies to “Homeland Justice,” later linked to Void Manticore[15]. Public sources sometimes personify Handala’s operators with names; BleepingComputer notes “Hatef” and “Hamsa” as alternative aliases[13], though these may also refer to malware names or slogans. In intelligence mapping, Check Point (March 2026) explicitly connects Handala to MOIS under its Void Manticore umbrella[17]. Notably, the FBI identifies Handala’s leadership as Iran-aligned and has tied it to previous MOIS malware campaigns[18][14].

    Handala is part of a larger ecosystem of Iranian-linked hacktivist fronts. CheckPoint describes Handala as one of several pro-Iranian hacktivist personas (others include APT Iran, Cyber Islamic Resistance, Dark Storm Team, etc.) that emerged in early 2026 to attack Israel and the West[19]. SocRadar emphasizes that Handala’s branding is explicitly pro-Palestinian (named after the Palestinian cartoon figure Handala), but analysts stress it is a state-directed persona (MOIS-linked) rather than a grassroots movement[14].

    Timeline of Activity

    Handala’s public activity is concentrated in the period 2023–2026, though it builds on prior Iranian-state campaigns (see timeline table below). Its first public appearances were on Dec 18, 2023, when a “Handala_hack” social media account launched Telegram and X posts[20]. This followed the Oct 7, 2023 Hamas attacks, after which Handala aligned with pro-Palestinian rhetoric[21]. Through 2024 and 2025 the group claimed multiple Israeli targets (government, corporate, healthcare), often posting purported data dumps or defacements. Notably, on July 26, 2024 the group used a CrowdStrike-themed spearphish and wiper to target Israeli organizations (Technical details in case study below)[22]. In June 2025, CheckPoint reported Handala among Iranian hackers scanning internet-connected cameras for surveillance[23]. In mid-2025 Handala also professed to hack Iranian dissidents abroad (e.g. leaked Iranian-Canadian activists’ info) as part of broader MOIS targeting[24][25].

    With the March 2026 Israel–Iran war escalation, Handala intensified disruptive attacks. On Mar 11, 2026 it publicly took credit for a destructive breach of Stryker Corp (US medical devices), claiming to have wiped ~12 PB of data across 200K systems[3][26]. Shortly after, U.S. authorities seized Handala’s leak sites. Then on Mar 27, 2026 Handala claimed to have breached FBI Director Kash Patel’s personal email[27][28]. (A DOJ official confirmed Patel’s Gmail was compromised, though extent of breach remains unverified[27][28].) These high-profile incidents mark Handala as a leading actor in Iran’s cyber “retaliation” campaign.

    The timeline table below summarizes key events:

    DateEvent / ClaimVictims / NotesSource(s)
    2022 (July)“Homeland Justice” (MOIS persona) used wipers on AlbaniaAlbanian government agencies (data-wipe wiper malware)Microsoft/MSRCT (2023)
    2023-12-18Handala emerges on social mediaLaunch of Handala Telegram/X channels[20]Trellix blog[20]
    2024-07-26CrowdStrike-themed wiper phishing attackIsraeli corporate targets[22] (Trojanized NSIS)Trellix[22]
    2025-07Dissident hack-and-leak claimsIranian dissidents in US/Canada[25]FBI Flash (Mar2026)[25]
    2026-03-11Handala claims Stryker (medical) data-wiping attackStryker Corp. (US) – ~200K devices wiped[3][26]Reuters[3]; CyberDaily[26]
    2026-03-19FBI seizes Handala domainshandala-redwanted.to, handala-hack.to (FBI seizure notice)[29]BleepingComputer[29]
    2026-03-24Stryker reports malicious file foundStryker (US) confirms Intune abuse; FBI links Handala to MOIS[4]SecurityWeek[4]
    2026-03-27Handala claims breach of FBI Dir Kash Patel’s emailFBI Director (US) – Patel’s Gmail (emails dating 2010–2019)[27][28]Reuters[27]; Axios[28]

    timeline
    Handala Activity Timeline
        2022-07-01 : MOIS “Homeland Justice” wiper attack in Albania (data destruction)
        2023-12-18 : Handala Hack Team appears on X/Telegram[20]
        2024-07-26 : CrowdStrike-themed wiper phishing to Israeli targets[22]
        2025-07-01 : Handala claims hack of Iranian dissidents abroad (MOIS-linked)[25]
        2026-03-11 : Stryker Corp data-wiping incident (Handala claims 12PB wiped)[3]
        2026-03-27 : FBI Dir Kash Patel email breach (Handala claims)[27]

    Victims and Victimology

    Handala’s claimed and suspected victims span Israeli government, military, healthcare and private sectors; Gulf nations allied with Israel; and U.S. entities. Confirmed targets include:
    Israeli organizations: multiple Israeli civilian agencies (healthcare, infrastructure, finance) have been cited. For example, Handala claimed (via Telegram/X) breaches of an Israeli energy company and healthcare systems, possibly aiming to pressure Israel’s home front[19]. In addition, Handala posted purported phone/email data of Israeli officials (e.g. aides to Netanyahu and Bennett)[30].
    International companies: In March 2026 Handala took credit for a cyberattack on Stryker Corp (US medical devices)[3][4], citing alleged “Zionist” ties (ownership of Orthospace, a military contract)[31]. Stryker’s systems were significantly disrupted, leading to an FBI domain seizure[29].
    U.S. government/law enforcement: The Mar 27, 2026 incident involved Hack on FBI Director Kash Patel’s Gmail[27]. A DOJ official confirmed Patel’s account was breached, though published excerpts are unverified[27][28]. This attack, if validated, would be an unprecedented breach of a senior U.S. law enforcement official’s personal communications.
    Diaspora/Influencers: Unit42 reports include Handala issuing death threats (via email/Telegram) to Iranian-Americans (influencers critical of Iran), even leaking addresses to “physical operatives”[24]. These appear aimed at silencing dissidents.
    Regional infrastructure: Handala (with allied hacktivist fronts) claimed breaches of Jordan’s fuel systems and payment networks, and Gulf/DUBAI infrastructure[19][32], likely to create regional pressure on Israel’s allies.

    Victimology (sector/geography): Predominantly Israeli targets (government, military-adjacent, healthcare, tech firms)[5][13]. Secondary targets include U.S. strategic assets (e.g. Stryker, FBI) and Middle Eastern countries supporting Israel (Jordan, UAE). Victim sectors broadly cover healthcare/medical, energy/critical infrastructure, government/defense, and telecommunications. For example, Check Point lists Handala compromising Israeli IT service providers (supply-chain) and exfiltrating client data[33].

    Confidence in victim claims varies. Many Handala statements are uncorroborated; Western analysts caution these groups exaggerate success[11][26]. For instance, while Handala released photos of Kash Patel, independent authentication is lacking[27][28]. By contrast, the Stryker incident has been confirmed (FBI involvement, media reporting)[3][4]. Where available, we rely on sources’ confirmations (e.g. DOJ official for Patel)[27]. Unknown victim details (e.g. exact data stolen) are noted as unspecified.

    Motivations and Objectives

    Handala’s declared motivation is retaliatory “retribution” for Israeli or U.S. actions against Iran and its proxies. Its propaganda is framed as avenging attacks on Iran (e.g. airstrikes on Iranian soil, Israeli actions in Gaza)[34]. The group’s statements often reference events like Israeli strikes on civilian sites, promising “only the beginning of a new era of cyber warfare”[35]. Experts view Handala as a tool for Iran to project power and sow chaos against adversaries (Israel, the West) while maintaining deniability. For example, Palo Alto and Check Point analysts call it a “cyber-retaliatory arm” combining hacktivist branding with destructive state-level tactics[1][2].

    Strategically, Handala’s actions appear aimed at psychological impact and disruption rather than espionage. Threat researchers note its “noisy, chaotic playbook” is designed to maximize visibility and fear[36]. Activities such as website defacements, public data dumps (hack-and-leak), and shock-value wipers (named after Israeli leaders, e.g. “Bibiwiper”) suggest a focus on narrative and intimidation[5][9]. Check Point observes Handala executing opportunistic breaches of “low-hanging fruit” (supply-chain providers) to quickly publicize hacks[33]. The timing of attacks (coinciding with airstrikes, political events) indicates they serve Iran’s interests of retaliation and propaganda. We assess the group’s primary objectives as: disrupting adversary infrastructure, undermining public confidence, and signaling Iran’s ability to strike back (with some share of overstatement).

    Attribution and Links to Other Actors

    There is strong consensus that Handala is linked to the Iranian state, specifically MOIS. Sources agree it is not an independent hacktivist collective but “one of several personas used by Iranian government cyberintelligence units”[3]. Wired and security firms explicitly call Handala a front for MOIS[1][14]. Palo Alto’s Unit42 echoes this, noting Handala is assessed as state-directed[2]. Even Handala’s own communications (domain seizures) acknowledged the need for new infrastructure, implying continuity of operations beyond a single “team”[37].

    Handala/ Void Manticore has technical and operational overlaps with other Iranian APTs. Check Point traces it to a MOIS-linked cluster active since 2022 (Void Manticore alias)[15]. Microsoft’s 2023 report on the Albanian hack attributes the parent group (Homeland Justice) to MOIS[15]. The SOCRadar profile notes industry tracking names it “Storm-0842”, “BANISHED KITTEN”, and links it with “Dune” (another Iranian hacktivist alias)[16]. While some Iranian hackers answer to the IRGC, analysts specifically attribute Handala to MOIS (in contrast to IRGC-affiliated groups like CyberAv3ngers)[38]. This distinction is important given MOIS’s focus on intelligence and destabilization.

    Notably, Unit42 and Palo Alto both mention recent law-enforcement attributions: the FBI and other agencies officially link Handala to MOIS cyber units[4][18]. The FBI’s March 2026 alert confirms that MOIS actors (including those behind Handala) use Telegram bot C2s for multi-stage malware[39][40]. No direct Iran government admission exists; Iran typically portrays such groups as grassroots patriotic hackers[36]. We rate attribution confidence as high, due to the volume of consistent evidence from multiple intelligence and vendor sources.

    Tactics, Techniques, and Procedures (TTPs)

    Handala’s known TTPs span Phases from Reconnaissance through Impact. We map key behaviors to the MITRE ATT&CK framework (see table below) based on vendor analyses:

    • Reconnaissance: Handala gathers target information (e.g. victim identities, network info) via open-source intelligence and social engineering (T1589/T1590). For example, it phishes individuals to collect credentials (spearphishing)[41].
    • Initial Access: The group frequently uses spearphishing (emails with malicious attachments or links, T1566.001/.002)[41]. It also exploits stolen credentials (valid accounts, T1078) and occasionally public-facing vulnerabilities (T1190). Check Point notes Handala using Starlink/VPN IPs to probe externally-facing applications for weak points[33]. In the Stryker case, analysts believe Handala abused compromised Intune admin credentials to push a wipe command (Initial Access via cloud account, T1078.004).
    • Execution: Execution is often via malicious installers/scripts. The July 2024 attack used a benign NSIS installer (“CrowdStrike.exe”) that unpacked an AutoIT script[42]. AutoIT and PowerShell (T1059.010) are used for launching wipers. Handala also uses fraudulent updates or scripts (e.g. faked security updates).
    • Persistence/Evasion: Tools are sometimes disguised as legitimate apps (FBI alert: “masquerading malware” stage mimicking Pictory, KeePass, Telegram)[43][44]. The AutoIT loader unhooks ntdll in memory (process hollowing, T1055.012)[45]. Batch scripts and renamed executables evade AV checks[46]. We see heavy obfuscation (AutoIT string obfuscation, T1027) and sandbox checks (skipping execution on known security product processes)[47][48].
    • Privilege Escalation/Lateral Movement: Once on a target, Handala has used compromised domain/Global Admin accounts (Stryker: new Global Admin via AD) to escalate privilege. It also uses tunneling tools (NetBird) and possibly RDP (T1021.001). MITRE mappings indicate use of webshells (T1505.003) and credential theft tools like Mimikatz historically (as with other Iranian APTs).
    • Command & Control (C2): Strikingly, Handala’s implants call home via Telegram bots (HTTP to api.telegram.org) for C2[49][44]. The wiper exfiltration in July 2024 used Telegram API to post system info[50]. Network indicators include connections to *.telegram.org and usage of anonymizing infrastructure (Starlink, VPN ranges[8]).
    • Impact: The hallmark of Handala is data destruction. It deploys custom wiper malware to erase files/entire drives (T1485 “Data Destruction”)[5][51]. Examples include Coolwipe, Chillwipe, Hamsa, HandalaWiper, and BibiWiper (named after PM Netanyahu)[5][9]. Some publicly masquerade as ransomware (Disk structure wipes, T1561.002). In the Stryker attack, even legitimate device management (Intune wipe command) was abused to destroy 80K endpoints[52].

    MITRE Technique Mappings: Based on the SOCRadar and other analyses[53][54], relevant MITRE IDs include:

    TacticTechnique (ID)Description (Handala usage)
    ReconnaissanceT1589, T1590Open-source OSINT and victim profiling (gathering network info)
    Initial AccessT1566.001/.002, T1566.003, T1190Spearphishing attachments/links/SMS; web exploits
     T1078.004Valid cloud accounts (Intune admin breach)
    ExecutionT1059.005 (NSIS), T1059.010 (AutoIT)NSIS installer unpacking AutoIT script for wiper execution
    Persistence/EvasionT1027, T1497.003, T1055.012, T1218Obfuscation, time-based evasion, process hollowing, LOLBins
    Privilege EscalationT1068 (known exploits)Exploiting vulnerabilities for admin rights (AD/Intune)
    Defense EvasionT1090, T1090.011 (Proxy/Starlink)Use of Starlink satellites and VPNs (T1090) to mask origin
    Lateral MovementT1021.001 (RDP), T1505.003 (webshell)Using tunneling and possibly RDP; webshell on servers
    C2T1071.004 (Web service – Telegram)Command/control via Telegram API bots
    Data ExfiltrationT1020 (Automated Exfiltration)Exfil via encrypted channels (Telegram, cloud storage)
    Impact (Wipe)T1485 (Data Destruction), T1561.002Custom wiper malware overwriting/deleting files and drives[50]

    These mappings summarize Handala’s modus operandi across the kill chain (detailed technique references are provided by SOCRadar[53][54] and vendor blogs[5][49]).

    Malware and Tools

    Handala leverages custom and repurposed malware. From technical reports:

    • Wipers: Coolwipe, Chillwipe, BibiWiper, Hamsa, HandalaWiper – these are custom disk-wiping payloads. Trellix’s analysis of the July 2024 attack revealed one such wiper (written in C/C++) that overwrote files with random data and used Telegram API for exfil[50][55]. SOCRadar lists hashes for a “Handala wiper used to erase files” (e.g. SHA256 5986ab04…) and “final destructive wiper payload” (2a5dd680…)[56]. The FBI and Palo Alto note similarly destructive tools, and Trellix reports the wiper asked victims’ consent (spoofing a CrowdStrike “update”) before executing[42][50].
    • Infostealers/Loaders: Handala has used a modified VeraCrypt installer (hash 3236facc…) during attacks[57], presumably to deliver payloads without detection. It also uses benign tunneling tools (e.g. NetBird) for persistence—SOCRadar notes NetBird installer and components in its campaigns[58]. In the CrowdStrike attack, the initial payload was an NSIS installer (CrowdStrike.exe) unpacking an AutoIT wiper payload[42].
    • Credential Harvesters: Past Handala (and related VOIDs) operations have used malware like Rhadamanthys (a commodity infostealer) to pilfer credentials for initial access[5]. Mimikatz and other known tools (juicy potato, etc.) are common in Iranian APT toolkits (see Trellix Iran blog) but specific usage by Handala is not well-documented.
    • Infrastructure Tools: The attackers use Telegram bots as C2. In analysis of the Stryker incident, FBI found Handala’s implants communicating with api.telegram.org (stage 2 C2)[49]. Researchers have also seen Handala using Starlink satellite IP ranges and commercial VPN networks to conduct scans[33][8]. Web-based file-hosting (Storjshare) was used to store malicious payloads (e.g. hxxps://link.storjshare.io/…/update.zip)[59].
    • Other Tools: As part of multifaceted campaigns, Handala-linked attacks may deploy public malware or ransomware to mask wipers. For example, some analyses report “ransomware-style extortion” posts and reuse of criminal malware for cover[5]. Tools for lateral movement (RDP, remote execution) and post-exploitation (e.g. PsExec, WMI) are likely, though specifics on Handala itself are sparse.

    Technical Note: The July 2024 Trellix case study (see next section) provides an in-depth look: Handala’s payload chain started with an NSIS installer launching an AutoIT script, which performed process hollowing (injecting into RegAsm.exe)[45], and finally ran a custom wiper. The AutoIT script included various anti-analysis checks and wrote a unique computer name into the payload to avoid execution on non-target systems[60].

    Infrastructure and IOCs

    Handala’s supporting infrastructure (domains, IPs, hosting) has been tracked by analysts and disrupted by law enforcement. Key artifacts include:

    • Domains: Handala operated public-facing leak sites (e.g. handala-redwanted[.]to, handala-hack[.]to) which the FBI seized on Mar 19, 2026[29]. These domains bore seizure banners noting foreign-state support. The group’s posts also point to file-hosting links (Storjshare URLs as above[59]). Handala’s content has been mirrored on Telegram channels and defacement pages.
    • Hosting/IPs: SOCRadar lists several IP addresses linked to Handala: e.g. 82.25.35.25 (VPS for attacks), 31.57.35.223 (C2), 107.189.19.52 (staging)[8]. It also notes network ranges used in campaigns: Starlink IPs (e.g. 188.92.255.0/24, 209.198.131.0/24) and VPN providers (149.88.26.0/24, 169.150.227.0/24)[61]. These reflect Handala’s use of satellite and VPN traffic to obfuscate origin. (Check Point observed Handala activity from Starlink as well[33].)
    • Email Addresses: Public sources include few concrete addresses, except a “from: Hussain Ali” in a purported death threat email[62]. In one threat email, Handala’s sender address was “Hussain Ali” (likely fictitious). No verified operational email addresses are known; Handala primarily communicates via Telegram and defacement posts.
    • Other Forensic Indicators: The FBI’s flash highlights recurring use of Telegram C2 (hosted at api.telegram.org) and typical paths (bots). The CrowdStrike wiper case provides IoCs: SOCRadar documents multiple file hashes for payloads used by Handala[63]. We compile an IOC Table below with key indicators (IPs, domains, hashes) and descriptions. (Enterprises should monitor for these IOCs and similar patterns.)
    TypeIndicatorDescription (use/campaign)Source
    Domainhandala-hack.to, handala-redwanted.toHandala hacktivist sites (FBI seized Mar 2026)[29]
    URLlink.storjshare.io/…/crowdstrikesupport/update.zipPayload for CrowdStrike-themed phishing[59][59]
    URLlink.storjshare.io/…/crowdstrikeisrael/update.zipAlternate payload URL used by Handala[59][59]
    IP82.25.35.25VPS used to stage attacks[8]
    IP31.57.35.223C&C server IP[8]
    IP107.189.19.52Staging infrastructure[8]
    IP Range188.92.255.0/24Starlink IP range (reconnaissance)[64]
    IP Range209.198.131.0/24Starlink infrastructure (operations)[64]
    Hash (SHA256)2a5dd680c05b43d72365e8beb7e40088Final destructive wiper binary[58]
    Hash (SHA256)5986ab04dd6b3d259935249741d3eff2“Handala wiper” erasing files[65]
    Hash (SHA256)755c0350038daefb29b888b6f8739e81CrowdStrike.exe NSIS loader (phishing payload)[66]
    Hash (SHA256)9fab9f640db1f75fb8c18bfb50976abdCarroll.cmd batch script (execution wrapper)[66]
    Hash (SHA256)fca0910949d92dc3dd3dfcf0fb3d0408AutoIT script loader (decodes & injects wiper)[66]
    C2api.telegram.orgTelegram bot C2 endpoint (stage-2 implant)[49][44]
    MiscHussain Ali <…> (threat email)Sender name on Handala threat emails to activists[62]

    Table: Selected Indicators of Compromise (IoCs) linked to Handala campaigns[29][8]. Hashes and IPs are samples from published research and should be treated as signature matches in defense systems.

    (For brevity, not all IOC entries from [43] are listed; see source[8][66] for full details, and FBI FLASH[67] for campaign context.)

    Case Study: CrowdStrike-Themed Wiper Attack

    A representative Handala attack chain is the July 26, 2024 “CrowdStrike outage fix” phishing campaign analyzed by Trellix[22]. In this incident (targeting Israeli victims), Handala used a highly believable social engineering lure and staged a multi-step infection:

    flow:
        Email[Phishing Email (CrowdStrike theme)] –> PDF[Embedded PDF (“CrowdStrike outage”)]
        PDF –> Link[Click link -> download “update.zip”]
        Link –> NSIS[Run NSIS installer “CrowdStrike.exe”]
        NSIS –> Batch[Extracts batch script “Carroll.cmd” and files]
        Batch –> AVCheck[Antivirus checks / sleep delays]
        AVCheck –> AutoIT[Creates & executes obfuscated AutoIT script]
        AutoIT –> Hollowing[Unhooks ntdll & Process Hollowing]
        Hollowing –> Wiper[Execute Wiper payload]
        Wiper –> Exfil[Collects machine info & sends to Telegram]

    1. Initial Lure: Victims received an email about a (fake) CrowdStrike outage with an attached PDF. The PDF contained a link to download an “update”[68].
    2. Installer: The downloaded ZIP (update.zip) contained an NSIS installer (CrowdStrike.exe). This benign-looking installer unpacked files silently to a temp folder[42].
    3. Antivirus Avoidance: A batch script (“Carroll.cmd”) was executed to detect running AV processes (Webroot, Avast, Sophos, etc.); if found, it inserted delays to stall execution[69]. It also dynamically assembled the next-stage binary (AutoIT) from pieces, renaming them if AV was present[70].
    4. Loader (AutoIT): The final AutoIT script (derived from files “Champion.pif” and “Ukraine” pieces) was launched[70]. This script performed environment checks (skipping execution in known sandboxes or if a special file C:\aaa_TouchMeNot_.txt was present)[48]. It then unhooked ntdll.dll in memory to evade user-mode hooks[71], and injected itself into a suspended RegAsm.exe process (process hollowing)[45].
    5. Wiper Payload: The payload (dropped from script resources) is a custom wiper. It first decompresses itself in memory, then, upon user confirmation, iterates all drives and folders matching wipe criteria, overwriting files with random 4KB blocks[50][72]. Before wiping, the wiper gathers system info (IP via icanhazip.com, user/machine/domain names, free disk space) and sends updates to a Telegram channel controlled by the attackers[50]. Notably, the wiper code checks if the machine name equals “Gaza hackers Team Handala Machine” – likely to avoid killing the operators’ own system[73]. Once wiping completes, empty directories are removed[50].

    Attack Flow: The above sequence illustrates Handala’s method of infiltrating a target and inflicting damage (wiping files). Key techniques include spearphishing (T1566), use of legitimate installers (T1059.005), script obfuscation (T1027), process injection (T1055.012), and coordinated exfiltration via Telegram (T1071.004).

    The CrowdStrike case exemplifies Handala’s modus operandi: malicious bait → loader → evasive script → destructive payload. After that intrusion, local authorities (Israeli NCD) warned of Iranian wiper attacks in early 2026[74], underscoring that Handala (and similar actors) have wipers as their primary weapons.

    Mitigations and Detection

    To counter Handala’s tactics, multiple sources recommend robust identity and endpoint defenses. Palo Alto’s Unit42 and Check Point advise:

    • Harden Identity and Access: Eliminate standing administrative privileges (use JIT access) and enforce MFA for all admin roles[75]. Specifically, Lock down Microsoft Intune: use dedicated cloud-only break-glass admin accounts, require hardware MFA (FIDO2) for critical roles, and enable multi-admin approval for wipe/delete operations[76][77]. Restrict Global/Admin roles (limit to necessary personnel) and audit service principals used by Intune[77].
    • Email and Phishing Defenses: Train users to recognize suspicious attachments. Deploy phishing-resistant MFA (token-based) on email and VPN login[78][79]. Treat unexpected “CrowdStrike” or vendor update emails with skepticism; verify them out-of-band. Apply email security scanning (content filter for NSIS, AutoIT payloads).
    • Network Monitoring: Block outbound Telegram API calls on enterprise networks unless explicitly needed[49]. Monitor for anomalous HTTPS traffic to unusual domains (like storjshare.io, Telegram, CDN phish-links[59]). Watch for logins from known commercial VPN/Starlink IP ranges[64] and logon attempts using stale credentials. Apply geoblock or alerting on access from unexpected regions.
    • Endpoint Protection: Keep all systems patched (especially Windows/Intune agents). Employ EDR to detect unusual process injections or the use of legitimate binaries (RegAsm.exe, Rundll32) for execution. Monitor for the specific wiper IOCs (hashes above) in file-scanning. Use EDR to detect scripts launching NSIS/AutoIT payloads[69][45]. Enable behavior-based detection: mass file overwrites or deletion (Impact T1561/T1486) should trigger alerts.
    • Backup and Recovery: Ensure offline backups exist for critical data; Handala’s modus is destruction, so rapid restore is vital. Verify integrity of backups regularly.
    • Public Guidance: Follow Microsoft and CISA’s Intune hardening advisories released after Stryker[80]. Israel’s NCD and U.S. agencies have also issued alerts on Iranian tactics (e.g. use of Telegram C2)[74][49]. Stay updated on threat intel.

    In summary, defenses should assume handala-type intrusions: phishing-first, credential-abuse, and wiper activation. The consensus is that strict identity hygiene (zero-standing privileges) and vigilant email filtering are top priorities[10][24].

    Confidence and Conclusion

    Our report synthesizes multiple open sources to characterize Handala. Attribution to Iran’s MOIS is made with high confidence, as it is consistently asserted by diverse vendors and U.S. agencies[1][2]. Victim attributions range from high to moderate confidence: some (FBI Patel, Stryker) have official corroboration[4][29]; others rely solely on Handala’s claims (flagged by analysts as potentially exaggerated)[11]. TTP and malware findings are well-substantiated by technical blogs and research (Trellix, SOCRadar, FBI)[50][63]. Key IOCs (hashes, IPs) come from reputable analyses, but these may evolve.

    Where data is lacking (e.g. identities of operators, full victim impact), we note it as unspecified. Overall, the consensus narrative is: Handala is a cyber avatar for Iran to conduct loud, destructive cyberattacks under a hacktivist guise. The sources unanimously emphasize its hack-and-wipe playbook. This report compiles that information systematically: aliases, timeline, tactics, tools, infrastructure, IOCs, and mitigations, with inline citations to support each claim.


    [1] [5] [15] [23] [30] [31] [34] [35] [36] How ‘Handala’ Became the Face of Iran’s Hacker Counterattacks | WIRED

    https://www.wired.com/story/handala-hacker-group-iran-us-israel-war

    [2] [10] [74] [75] [76] [77] [79] Insights: Increased Risk of Wiper Attacks

    https://unit42.paloaltonetworks.com/handala-hack-wiper-attacks

    [3] [27] Iran-linked hackers breach FBI director’s personal email, publish excerpts online | Reuters

    https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27

    [4] [6] [43] [49] Stryker Says Malicious File Found During Probe Into Iran-Linked Attack – SecurityWeek

    https://www.securityweek.com/stryker-says-malicious-file-found-during-probe-into-iran-linked-attack

    [7] [13] [29] [37] [52] [80] FBI seizes Handala data leak site after Stryker cyberattack

    https://www.bleepingcomputer.com/news/security/fbi-seizes-handala-data-leak-site-after-stryker-cyberattack

    [8] [14] [16] [21] [38] [41] [51] [53] [54] [56] [57] [58] [59] [61] [63] [64] [65] [66] Dark Web Profile: Handala Hack

    https://socradar.io/blog/dark-web-profile-handala-hack

    [9] The Iranian Cyber Capability

    https://www.trellix.com/blogs/research/the-iranian-cyber-capability

    [11] [12] [28] Iran-linked group claims hack of FBI Director Kash Patel

    https://www.axios.com/2026/03/27/fbi-kash-patel-iran-cyberattack

    [17] [33] [78] What Defenders Need to Know about Iran’s Cyber Capabilities – Check Point Blog

    https://blog.checkpoint.com/research/what-defenders-need-to-know-about-irans-cyber-capabilities

    [18] [25] [39] [40] [44] [67] Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets

    [19] [24] [32] [62] Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Updated March 26)

    https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026

    [20] [22] [42] [45] [46] [47] [48] [50] [55] [60] [68] [69] [70] [71] [72] [73] Handala’s Wiper Targets Israel

    https://www.trellix.com/blogs/research/handalas-wiper-targets-israel

    [26] Update: Stryker hackers claim to have wiped 12PB of company data – Cyber Daily

    https://www.cyberdaily.au/security/13337-update-stryker-hackers-claim-to-have-wiped-12-petabytes-of-company-data